story-short-scan

Warn

Audited by Socket on May 13, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/heiyan-booklist-scraper.js

This module is an authenticated automation script that logs in via an existing Chrome session by harvesting a sensitive Admin-Token cookie using CDP-evaluated JavaScript, then uses that token to call privileged management API endpoints and writes scraped results to a local Markdown file. No explicit malware/persistence/destructive actions are evident in this fragment; however, the credential-extraction pattern and dynamic code execution (evalJSON with string-built browser-side code) materially increase supply-chain security risk and would be unacceptable in many threat models. Risk severity is driven by token theft/misuse characteristics, not by overt exploitation or system compromise behavior in the shown code.

Confidence: 68%Severity: 66%
Audit Metadata
Analyzed At
May 13, 2026, 06:46 AM
Package URL
pkg:socket/skills-sh/worldwonderer%2Foh-story-claudecode%2Fstory-short-scan%2F@1abc82027366c21254fb3087d3e12b32092e7947